Condor-a hunter of idle workstations MJ Litzkow, M Livny, MW Mutka IEEE Conference on Distributed Computing Systems (ICDCS), 104-111, 1988 | 3655 | 1988 |
The evolution of MAC protocols in wireless sensor networks: A survey P Huang, L Xiao, S Soltani, MW Mutka, N Xi IEEE communications surveys & tutorials 15 (1), 101-120, 2012 | 803 | 2012 |
Service discovery in pervasive computing environments F Zhu, MW Mutka, LM Ni IEEE Pervasive computing 4 (4), 81-90, 2005 | 616 | 2005 |
Prophet address allocation for large scale MANETs H Zhou, LM Ni, MW Mutka Ad Hoc Networks 1 (4), 423-434, 2003 | 401 | 2003 |
The available capacity of a privately owned workstation environment MW Mutka, M Livny Performance Evaluation 12 (4), 269-284, 1991 | 263 | 1991 |
MSU jumper: A single-motor-actuated miniature steerable jumping robot J Zhao, J Xu, B Gao, N Xi, FJ Cintron, MW Mutka, L Xiao IEEE Transactions on Robotics 29 (3), 602-614, 2013 | 196 | 2013 |
Efficient multicast algorithms for multichannel wireless mesh networks G Zeng, B Wang, Y Ding, L Xiao, M Mutka IEEE Transactions on Parallel and Distributed Systems 21 (1), 86-99, 2009 | 171 | 2009 |
Bitcoin and blockchain: Security and privacy E Zaghloul, T Li, MW Mutka, J Ren IEEE Internet of Things Journal 7 (10), 10288-10313, 2020 | 170 | 2020 |
Splendor: A secure, private, and location-aware service discovery protocol supporting mobile services F Zhu, M Mutka, L Ni Proceedings of the First IEEE International Conference on Pervasive …, 2003 | 156 | 2003 |
Multicast algorithms for multi-channel wireless mesh networks G Zeng, B Wang, Y Ding, L Xiao, M Mutka 2007 IEEE International Conference on Network Protocols, 1-10, 2007 | 149 | 2007 |
Profiling workstation's available capacity for remote execution MW Mutka, M Livny University of Wisconsin-Madison Department of Computer Sciences, 1987 | 127 | 1987 |
Profiling workstations' available capacity for remote execution, Performance'87 MW Mutka, M Livny Proc. of the 12th IFIP WG 7, 529-544, 1987 | 127* | 1987 |
Wizsync: Exploiting wi-fi infrastructure for clock synchronization in wireless sensor networks T Hao, R Zhou, G Xing, MW Mutka, J Chen IEEE Transactions on mobile computing 13 (6), 1379-1392, 2013 | 117 | 2013 |
MSU tailbot: Controlling aerial maneuver of a miniature-tailed jumping robot J Zhao, T Zhao, N Xi, MW Mutka, L Xiao IEEE/ASME Transactions on Mechatronics 20 (6), 2903-2914, 2015 | 101 | 2015 |
Scheduling remote processing capacity in a workstation-processor bank network MW Mutka, M Livny Proceedings of the 7th International Conference on Distributed Computing …, 1987 | 97 | 1987 |
Making infrastructure visible for nomadic work G Mark, NM Su Pervasive and Mobile Computing 6 (3), 312-323, 2010 | 94 | 2010 |
Making infrastructure visible for nomadic work G Mark, NM Su Pervasive and Mobile Computing 6 (3), 312-323, 2010 | 94 | 2010 |
A private, secure, and user-centric information exposure model for service discovery protocols F Zhu, MW Mutka, LM Ni IEEE Transactions on Mobile Computing 5 (4), 418-429, 2006 | 88 | 2006 |
Priority based real-time communication for large scale wormhole networks JP Li, MW Mutka Proceedings of 8th International Parallel Processing Symposium, 433-438, 1994 | 84 | 1994 |
Estimating capacity for sharing in a privately owned workstation environment MW Mutka IEEE Transactions on Software Engineering 18 (4), 319, 1992 | 81 | 1992 |